Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.85.170.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46567
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.85.170.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 16:57:57 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 242.170.85.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.170.85.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.199.212.82 attackspam
Dec 15 16:22:29 lnxmysql61 sshd[11408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.212.82
2019-12-15 23:44:30
23.99.176.168 attack
Dec 15 10:56:43 TORMINT sshd\[14217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.99.176.168  user=root
Dec 15 10:56:45 TORMINT sshd\[14217\]: Failed password for root from 23.99.176.168 port 3968 ssh2
Dec 15 11:03:11 TORMINT sshd\[14676\]: Invalid user anuar from 23.99.176.168
Dec 15 11:03:11 TORMINT sshd\[14676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.99.176.168
...
2019-12-16 00:29:42
159.89.153.54 attackbots
Dec 15 16:36:31 sd-53420 sshd\[14932\]: Invalid user ident from 159.89.153.54
Dec 15 16:36:31 sd-53420 sshd\[14932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.153.54
Dec 15 16:36:33 sd-53420 sshd\[14932\]: Failed password for invalid user ident from 159.89.153.54 port 57758 ssh2
Dec 15 16:42:18 sd-53420 sshd\[16544\]: User ftp from 159.89.153.54 not allowed because none of user's groups are listed in AllowGroups
Dec 15 16:42:18 sd-53420 sshd\[16544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.153.54  user=ftp
...
2019-12-15 23:50:48
129.211.147.251 attackbots
Dec 15 15:45:30 minden010 sshd[17353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.147.251
Dec 15 15:45:32 minden010 sshd[17353]: Failed password for invalid user awi from 129.211.147.251 port 50510 ssh2
Dec 15 15:52:57 minden010 sshd[19726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.147.251
...
2019-12-16 00:26:28
106.13.183.19 attackbots
Repeated brute force against a port
2019-12-15 23:56:28
103.110.89.148 attackspam
Dec 15 16:54:15 ArkNodeAT sshd\[12005\]: Invalid user plex from 103.110.89.148
Dec 15 16:54:15 ArkNodeAT sshd\[12005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.110.89.148
Dec 15 16:54:16 ArkNodeAT sshd\[12005\]: Failed password for invalid user plex from 103.110.89.148 port 37922 ssh2
2019-12-16 00:05:27
142.44.184.156 attackbotsspam
Dec 15 10:45:58 ny01 sshd[24867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.156
Dec 15 10:46:01 ny01 sshd[24867]: Failed password for invalid user moltmann from 142.44.184.156 port 56492 ssh2
Dec 15 10:52:58 ny01 sshd[25504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.156
2019-12-15 23:58:01
206.189.30.229 attackspam
Dec 15 16:27:48 vps647732 sshd[5878]: Failed password for root from 206.189.30.229 port 50656 ssh2
...
2019-12-15 23:49:36
79.153.146.31 attackspambots
Dec 15 14:53:26 sshgateway sshd\[25414\]: Invalid user lehl from 79.153.146.31
Dec 15 14:53:26 sshgateway sshd\[25414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.red-79-153-146.dynamicip.rima-tde.net
Dec 15 14:53:28 sshgateway sshd\[25414\]: Failed password for invalid user lehl from 79.153.146.31 port 37446 ssh2
2019-12-16 00:05:03
45.55.47.149 attackspambots
Dec 15 16:00:22 pi sshd\[28520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149
Dec 15 16:00:25 pi sshd\[28520\]: Failed password for invalid user guest from 45.55.47.149 port 43554 ssh2
Dec 15 16:08:29 pi sshd\[28765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149  user=root
Dec 15 16:08:30 pi sshd\[28765\]: Failed password for root from 45.55.47.149 port 47598 ssh2
Dec 15 16:17:04 pi sshd\[29131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149  user=sync
...
2019-12-16 00:25:35
78.178.8.152 attack
Dec 15 17:53:09 debian-2gb-vpn-nbg1-1 kernel: [799960.857677] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=78.178.8.152 DST=78.46.192.101 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=29896 DF PROTO=TCP SPT=38234 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-16 00:17:53
116.118.106.25 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-12-16 00:28:27
60.210.40.197 attack
Dec 15 14:03:52 vtv3 sshd[6983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.40.197 
Dec 15 14:03:54 vtv3 sshd[6983]: Failed password for invalid user namote from 60.210.40.197 port 22560 ssh2
Dec 15 14:09:07 vtv3 sshd[9348]: Failed password for backup from 60.210.40.197 port 22562 ssh2
Dec 15 14:22:37 vtv3 sshd[15910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.40.197 
Dec 15 14:22:39 vtv3 sshd[15910]: Failed password for invalid user forms from 60.210.40.197 port 22568 ssh2
Dec 15 14:26:35 vtv3 sshd[17940]: Failed password for root from 60.210.40.197 port 22569 ssh2
Dec 15 14:48:58 vtv3 sshd[28672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.40.197 
Dec 15 14:49:00 vtv3 sshd[28672]: Failed password for invalid user guest from 60.210.40.197 port 22575 ssh2
Dec 15 14:55:07 vtv3 sshd[31418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0
2019-12-15 23:48:38
188.250.223.156 attack
2019-12-15T10:40:11.179164homeassistant sshd[10238]: Failed password for invalid user named from 188.250.223.156 port 59128 ssh2
2019-12-15T15:44:35.429478homeassistant sshd[17644]: Invalid user lyster from 188.250.223.156 port 48114
...
2019-12-16 00:11:07
14.102.44.14 attackspambots
/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=busybox&curpath=/¤tsetting.htm=1
2019-12-16 00:06:53

Recently Reported IPs

150.45.33.154 49.1.32.10 225.159.244.63 73.131.233.182
204.210.54.114 69.18.223.187 173.112.186.202 238.59.225.189
224.191.63.64 114.131.8.100 235.213.226.151 109.213.149.22
194.162.254.181 171.157.100.24 214.254.102.194 214.183.105.224
234.162.85.144 179.70.43.221 81.96.190.90 182.102.146.45